
REFERENCE
[9] H. Li, X. Xu, C. Liu, et al., “A machine learning approach to prevent mali-
cious calls over telephony networks,” in 2018 IEEE Symposium on Security
and Privacy (SP), 2018, pp. 53–69. DOI: 10.1109/SP.2018.00034.
[10] T. N. Kipf and M. Welling, “Semi-supervised classification with graph con-
volutional networks,” CoRR, vol. abs/1609.02907, 2016. arXiv: 1609.02907.
[Online]. Available: http://arxiv.org/abs/1609.02907.
[11] E. Schooler, J. Rosenberg, H. Schulzrinne, et al., SIP: Session Initiation Pro-
tocol, RFC 3261, Jul. 2002. DOI: 10.17487/RFC3261. [Online]. Avail-
able: https://www.rfc-editor.org/info/rfc3261.
[12] J. Heo, T. Kusumoto, E. Y. Chen, and M. Itoh, “A statistical analysis method
for detecting mass call spam in sip-based voip service,” in 8th Asia-Pacific
Symposium on Information and Telecommunication Technologies, 2010, pp. 1–
6.
[13] Y. Bai, X. Su, and B. Bhargava, “Detection and f iltering spam over internet
telephony — a user-behavior-aware intermediate-network-based approach,”
in 2009 IEEE International Conference on Multimedia and Expo, 2009, pp. 726–
729. DOI: 10.1109/ICME.2009.5202597.
[14] A. Kwong, J. H. Muzamal, and Z. Khan, “Privacy pro: Spam calls detection
using voice signature analysis and behavior-based filtering,” in 2022 17th
International Conference on Emerging Technologies (ICET), 2022, pp. 184–
189. DOI: 10.1109/ICET56601.2022.10004692.
[15] H. Huang, H.-T. Yu, and X.-L. Feng, “A spit detection method using voice
activity analysis,” in 2009 International Conference on Multimedia Informa-
tion Networking and Security, vol. 2, 2009, pp. 370–373. DOI: 10.1109/
MINES.2009.253.
[16] R. J. Ben Chikha, T. Abbes, and A. Bouhoula, “A spit detection algorithm
based on user’s call behavior,” in 2013 21st International Conference on
Software, Telecommunications and Computer Networks - (SoftCOM 2013),
2013, pp. 1–5. DOI: 10.1109/SoftCOM.2013.6671851.
[17] H. Zhang and R. Dantu, “Opt-in detection based on call detail records,”
in 2009 6th IEEE Consumer Communications and Networking Conference,
2009, pp. 1–2. DOI: 10.1109/CCNC.2009.4784920.
[18] P. Ravula, S. Kumar Ch, S. Gopisetty, H. Pedhamallu, V. K. Mishra, and T.
Badal, “Voip spam detection using machine learning,” in 2022 6th Interna-
tional Conference on Intelligent Computing and Control Systems (ICICCS),
2022, pp. 1251–1258. DOI: 10.1109/ICICCS53718.2022.9788233.
47